-b21b-0b8bbe5af29c
Jan 9 00:32:19 ip-172-31-29-215 systemd[1]: Starting Daily apt download activities...
Jan 9 00:32:50 ip-172-31-29-215 apt-helper[889929]: E: Sub-process nm-online returned an error code (1)
Jan 9 00:32:50 ip-172-31-29-215 systemd[1]: Starting Update APT News...
Jan 9 00:32:50 ip-172-31-29-215 systemd[1]: Starting Update the local ESM caches...
Jan 9 00:32:50 ip-172-31-29-215 systemd[1]: apt-news.service: Succeeded.
Jan 9 00:32:50 ip-172-31-29-215 systemd[1]: Finished Update APT News.
Jan 9 00:32:51 ip-172-31-29-215 systemd[1]: esm-cache.service: Succeeded.
Jan 9 00:32:51 ip-172-31-29-215 systemd[1]: Finished Update the local ESM caches.
Jan 9 00:32:53 ip-172-31-29-215 dbus-daemon[475]: [system] Activating via systemd: service name='org.freedesktop.PackageKit' unit='packagekit.service' requested by ':1.9133' (uid=0 pid=890421 comm="/usr/bin/gdbus call --system --dest org.freedeskto" label="unconfined")
Jan 9 00:32:53 ip-172-31-29-215 systemd[1]: Starting PackageKit Daemon...
Jan 9 00:32:53 ip-172-31-29-215 PackageKit: daemon start
Jan 9 00:32:53 ip-172-31-29-215 dbus-daemon[475]: [system] Successfully activated service 'org.freedesktop.PackageKit'
Jan 9 00:32:53 ip-172-31-29-215 systemd[1]: Started PackageKit Daemon.
Jan 9 00:33:04 ip-172-31-29-215 systemd[1]: apt-daily.service: Succeeded.
Jan 9 00:33:04 ip-172-31-29-215 systemd[1]: Finished Daily apt download activities.
Jan 9 00:37:59 ip-172-31-29-215 PackageKit: daemon quit
Jan 9 00:37:59 ip-172-31-29-215 systemd[1]: packagekit.service: Succeeded.
Jan 9 00:39:01 ip-172-31-29-215 CRON[890576]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi)
Jan 9 00:39:19 ip-172-31-29-215 systemd[1]: Starting Clean php session files...
Jan 9 00:39:19 ip-172-31-29-215 sessionclean[890589]: Cannot load Xdebug - it was already loaded
Jan 9 00:39:19 ip-172-31-29-215 sessionclean[890589]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0
Jan 9 00:39:19 ip-172-31-29-215 sessionclean[890589]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0
Jan 9 00:39:19 ip-172-31-29-215 sessionclean[890589]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0
Jan 9 00:39:19 ip-172-31-29-215 sessionclean[890589]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0
Jan 9 00:39:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded.
Jan 9 00:39:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files.
Jan 9 00:40:01 ip-172-31-29-215 CRON[890627]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp)
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 2025-01-09 00:55:45.7188 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: caused by: EC2MetadataError: failed to make EC2Metadata request
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 404 - Not Found
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 404 - Not Found
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: #011status code: 404, request id:
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 2025-01-09 00:55:45.7563 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084
Jan 9 00:55:45 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: #011status code: 400, request id: c3cd3ddf-39c1-47ff-94a6-1725b649c55d
Jan 9 01:00:01 ip-172-31-29-215 CRON[890656]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp)
Jan 9 01:09:01 ip-172-31-29-215 CRON[890682]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi)
Jan 9 01:09:19 ip-172-31-29-215 systemd[1]: Starting Clean php session files...
Jan 9 01:09:19 ip-172-31-29-215 sessionclean[890696]: Cannot load Xdebug - it was already loaded
Jan 9 01:09:19 ip-172-31-29-215 sessionclean[890696]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0
Jan 9 01:09:19 ip-172-31-29-215 sessionclean[890696]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0
Jan 9 01:09:19 ip-172-31-29-215 sessionclean[890696]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0
Jan 9 01:09:19 ip-172-31-29-215 sessionclean[890696]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0
Jan 9 01:09:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded.
Jan 9 01:09:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files.
Jan 9 01:17:01 ip-172-31-29-215 CRON[890736]: (root) CMD ( cd / && run-parts --report /etc/cron.hourly)
Jan 9 01:20:01 ip-172-31-29-215 CRON[890741]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp)
Jan 9 01:22:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 2025-01-09 01:22:02.7651 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found
Jan 9 01:22:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: caused by: EC2MetadataError: failed to make EC2Metadata request
Jan 9 01:22:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 01:22:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 01:22:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 01:22:02 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 01:22:02 ip-172-31-29-215 amazon-ssm37.36 (KHTML, like Gecko; compatible; BW/1.3; rb.gy/qyzae5) Chrome/124.0.0.0 Safari/537.36"
20.236.249.81 - - [09/Jan/2025:01:28:05 -0600] "GET /owa/auth/logon.aspx HTTP/1.1" 404 3528 "-" "Mozilla/5.0 zgrab/0.x"
159.223.205.208 - - [09/Jan/2025:01:33:08 -0600] "GET /.env HTTP/1.1" 404 454 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/73.0.3683.103 Safari/537.36"
54.167.1.242 - - [09/Jan/2025:01:40:24 -0600] "GET /.git/HEAD HTTP/1.1" 404 454 "-" "Python-urllib/3.12"
159.223.205.208 - - [09/Jan/2025:01:43:11 -0600] "GET /.env HTTP/1.1" 404 4133 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/12.0 Safari/605.1.15"
45.79.181.223 - - [09/Jan/2025:01:45:34 -0600] "\x16\x03\x01" 400 488 "-" "-"
3.145.166.2 - - [09/Jan/2025:01:48:43 -0600] "\x16\x03\x01" 400 488 "-" "-"
3.145.166.2 - - [09/Jan/2025:01:48:55 -0600] "GET / HTTP/1.1" 200 3421 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) Chrome/126.0.0.0 Safari/537.36"
213.253.100.218 - - [09/Jan/2025:01:49:41 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-118768.png HTTP/1.1" 200 72186 "-" "Mozilla/4.0 (compatible; ms-office; MSOffice 16)"
34.147.120.7 - - [09/Jan/2025:01:55:38 -0600] "GET / HTTP/1.1" 200 7179 "-" "Scrapy/2.11.2 (+https://scrapy.org)"
193.34.212.75 - - [09/Jan/2025:01:57:58 -0600] "GET / HTTP/1.1" 200 11173 "-" "-"
78.7.251.26 - - [09/Jan/2025:02:13:06 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-125548.png HTTP/1.1" 200 21419 "-" "Mozilla/4.0 (compatible; ms-office; MSOffice 16)"
78.7.251.26 - - [09/Jan/2025:02:13:06 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-125548.png HTTP/1.1" 200 21419 "-" "Mozilla/4.0 (compatible; ms-office; MSOffice 16)"
87.121.79.3 - - [09/Jan/2025:02:15:46 -0600] "GET / HTTP/1.1" 200 3477 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46"
194.100.226.71 - - [09/Jan/2025:02:19:22 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-125996.png HTTP/1.1" 304 3476 "-" "Mozilla/4.0 (compatible; ms-office; MSOffice 16)"
194.100.226.71 - - [09/Jan/2025:02:19:22 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-125996.png HTTP/1.1" 304 3476 "-" "Mozilla/4.0 (compatible; ms-office; MSOffice 16)"
205.210.31.204 - - [09/Jan/2025:02:28:26 -0600] "\x16\x03\x01" 400 488 "-" "-"
205.210.31.204 - - [09/Jan/2025:02:28:27 -0600] "\x16\x03\x01" 400 488 "-" "-"
46.19.138.234 - - [09/Jan/2025:02:47:28 -0600] "GET / HTTP/1.1" 200 3477 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.85 Safari/537.36 Edg/90.0.818.46"
54.184.244.82 - - [09/Jan/2025:02:50:15 -0600] "GET / HTTP/1.1" 200 7162 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.100 Safari/537.36"
78.153.140.158 - - [09/Jan/2025:02:53:46 -0600] "GET /.env HTTP/1.1" 404 491 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.140 Safari/537.36"
78.153.140.158 - - [09/Jan/2025:02:53:46 -0600] "POST / HTTP/1.1" 200 3477 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.140 Safari/537.36"
45.156.129.70 - - [09/Jan/2025:02:55:24 -0600] "GET / HTTP/1.1" 200 6571 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36"
194.100.226.71 - - [09/Jan/2025:02:57:50 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-125996.png HTTP/1.1" 304 3476 "-" "Mozilla/4.0 (compatible; ms-office; MSOffice 16)"
194.100.226.71 - - [09/Jan/2025:02:57:51 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-125996.png HTTP/1.1" 304 3476 "-" "Mozilla/4.0 (compatible; ms-office; MSOffice 16)"
124.156.187.113 - - [09/Jan/2025:02:58:22 -0600] "HEAD /Core/Skin/Login.aspx HTTP/1.1" 404 140 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.0.0 Safari/537.36"
78.7.251.26 - - [09/Jan/2025:03:01:54 -06m-agent[78184]: 2025-01-09 02:17:38.9383 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084
Jan 9 02:17:38 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: #011status code: 400, request id: 45e807fc-0d50-4517-b843-9a6a82dee7eb
Jan 9 02:20:01 ip-172-31-29-215 CRON[890939]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp)
Jan 9 02:39:01 ip-172-31-29-215 systemd[1]: Starting Clean php session files...
Jan 9 02:39:01 ip-172-31-29-215 sessionclean[891023]: Cannot load Xdebug - it was already loaded
Jan 9 02:39:01 ip-172-31-29-215 sessionclean[891023]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0
Jan 9 02:39:01 ip-172-31-29-215 sessionclean[891023]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0
Jan 9 02:39:01 ip-172-31-29-215 sessionclean[891023]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0
Jan 9 02:39:01 ip-172-31-29-215 sessionclean[891023]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0
Jan 9 02:39:01 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded.
Jan 9 02:39:01 ip-172-31-29-215 systemd[1]: Finished Clean php session files.
Jan 9 02:39:01 ip-172-31-29-215 CRON[891063]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi)
Jan 9 02:40:01 ip-172-31-29-215 CRON[891069]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp)
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 2025-01-09 02:47:19.0172 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: caused by: EC2MetadataError: failed to make EC2Metadata request
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 404 - Not Found
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 404 - Not Found
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: #011status code: 404, request id:
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 2025-01-09 02:47:19.0552 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084
Jan 9 02:47:19 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: #011status code: 400, request id: 713b9ac9-fe3c-4aba-865d-e2edfff3da2b
Jan 9 03:00:01 ip-172-31-29-215 CRON[891146]: (smmsp) CMD (test -x /etc/init.d/sendmail && test -x /usr/share/sendmail/sendmail && test -x /usr/lib/sm.bin/sendmail && /usr/share/sendmail/sendmail cron-msp)
Jan 9 03:09:01 ip-172-31-29-215 CRON[891171]: (root) CMD ( [ -x /usr/lib/php/sessionclean ] && if [ ! -d /run/systemd/system ]; then /usr/lib/php/sessionclean; fi)
Jan 9 03:09:19 ip-172-31-29-215 systemd[1]: Starting Clean php session files...
Jan 9 03:09:19 ip-172-31-29-215 sessionclean[891184]: Cannot load Xdebug - it was already loaded
Jan 9 03:09:19 ip-172-31-29-215 sessionclean[891184]: PHP Warning: PHP Startup: Unable to load dynamic library 'pdo_sqlsrv.so' (tried: /usr/lib/php/20190902/pdo_sqlsrv.so (/usr/lib/php/20190902/pdo_sqlsrv.so: undefined symbol: php_pdo_unregister_driver), /usr/lib/php/20190902/pdo_sqlsrv.so.so (/usr/lib/php/20190902/pdo_sqlsrv.so.so: cannot open shared object file: No such file or directory)) in Unknown on line 0
Jan 9 03:09:19 ip-172-31-29-215 sessionclean[891184]: PHP Warning: Module 'gettext' already loaded in Unknown on line 0
Jan 9 03:09:19 ip-172-31-29-215 sessionclean[891184]: PHP Warning: Module 'mbstring' already loaded in Unknown on line 0
Jan 9 03:09:19 ip-172-31-29-215 sessionclean[891184]: PHP Warning: Module 'sqlsrv' already loaded in Unknown on line 0
Jan 9 03:09:20 ip-172-31-29-215 systemd[1]: phpsessionclean.service: Succeeded.
Jan 9 03:09:20 ip-172-31-29-215 systemd[1]: Finished Clean php session files.
Jan 9 03:10:01 ip-172-31-29-215 CRON[891225]: (root) CMD (test -e /run/systemd/system || SERVICE_MODE=1 /sbin/e2scrub_all -A -r)
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 2025-01-09 03:13:53.1383 WARN EC2RoleProvider Failed to connect to Systems Manager with instance profile role credentials. Err: retrieved credentials failed to report to ssm. Error: EC2RoleRequestError: no EC2 instance role found
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: caused by: EC2MetadataError: failed to make EC2Metadata request
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 404 - Not Found
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 404 - Not Found
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: #011status code: 404, request id:
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: 2025-01-09 03:13:53.1823 ERROR EC2RoleProvider Failed to connect to Systems Manager with SSM role credentials. error calling RequestManagedInstanceRoleToken: AccessDeniedException: Systems Manager's instance management role is not configured for account: 227937466084
Jan 9 03:13:53 ip-172-31-29-215 amazon-ssm-agent.amazon-ssm-agent[78184]: #011status code: 400, request id: 2626dcef-3410-4758-be6d-8b39ce54abf5
Jan 9 03X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36"
192.155.90.220 - - [09/Jan/2025:04:36:06 -0600] "GET / HTTP/1.1" 200 6571 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 13_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.0.0 Safari/537.36"
183.96.179.185 - - [09/Jan/2025:04:49:44 -0600] "GET / HTTP/1.0" 200 11192 "-" "curl/7.88.1"
185.242.226.117 - - [09/Jan/2025:05:02:09 -0600] "GET / HTTP/1.1" 200 6571 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/88.0.4324.190 Safari/537.36"
118.32.205.182 - - [09/Jan/2025:05:02:29 -0600] "GET / HTTP/1.0" 200 11192 "-" "curl/7.88.1"
54.184.244.82 - - [09/Jan/2025:05:03:06 -0600] "GET / HTTP/1.1" 200 7162 "-" "grub-client-1.5.3; (grub-client-1.5.3; Crawl your own stuff with http://grub.org)"
188.166.191.16 - - [09/Jan/2025:05:16:43 -0600] "GET /.env HTTP/1.1" 404 491 "-" "-"
188.166.191.16 - - [09/Jan/2025:05:16:44 -0600] "GET /.env HTTP/1.1" 404 4205 "-" "-"
18.166.88.66 - - [09/Jan/2025:05:23:48 -0600] "GET / HTTP/1.1" 200 7162 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:93.0) Gecko/20100101 Firefox/93.0"
35.231.92.0 - - [09/Jan/2025:05:27:45 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-92913.gif HTTP/1.1" 200 9432 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 18_1_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E148 [SuperhumanProxy]/1.0 (email hello AT superhuman.com)"
35.231.92.0 - - [09/Jan/2025:05:27:45 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-92900.gif HTTP/1.1" 200 10331 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 18_1_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E148 [SuperhumanProxy]/1.0 (email hello AT superhuman.com)"
35.231.92.0 - - [09/Jan/2025:05:27:48 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-92900.gif HTTP/1.1" 200 10331 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 18_1_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E148 [SuperhumanProxy]/1.0 (email hello AT superhuman.com)"
35.231.92.0 - - [09/Jan/2025:05:27:48 -0600] "GET /imagenesAptusLegal/arochi/LogosArochi/MAR-92913.gif HTTP/1.1" 200 9432 "-" "Mozilla/5.0 (iPhone; CPU iPhone OS 18_1_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E148 [SuperhumanProxy]/1.0 (email hello AT superhuman.com)"
78.153.140.158 - - [09/Jan/2025:05:37:36 -0600] "GET /.env HTTP/1.1" 404 491 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.140 Safari/537.36"
78.153.140.158 - - [09/Jan/2025:05:37:37 -0600] "POST / HTTP/1.1" 200 3477 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.140 Safari/537.36"
195.2.81.171 - - [09/Jan/2025:05:43:06 -0600] "GET / HTTP/1.1" 200 7198 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36"
195.2.81.171 - - [09/Jan/2025:05:43:13 -0600] "GET /en/mod/mod_userdir.html HTTP/1.1" 404 4171 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36"
195.2.81.171 - - [09/Jan/2025:05:43:13 -0600] "GET /fr/mod/mod_userdir.html HTTP/1.1" 404 4171 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36"
195.2.81.171 - - [09/Jan/2025:05:43:14 -0600] "GET /ja/mod/mod_userdir.html HTTP/1.1" 404 4171 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36"
195.2.81.171 - - [09/Jan/2025:05:43:14 -0600] "GET /ko/mod/mod_userdir.html HTTP/1.1" 404 4171 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36"
195.2.81.171 - - [09/Jan/2025:05:43:21 -0600] "GET /tr/mod/mod_userdir.html HTTP/1.1" 404 4171 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36"
195.2.81.171 - - [09/Jan/2025:05:43:21 -0600] "GET / HTTP/1.1" 200 7198 "-" "Mozilla/5.0 (Windows NT 10.0; Win64{"data":{"auth":{"last-id":0,"users":null,"device":{"brand":"canonical","model":"aws-classic","serial":"d54ba04a-695c-4c8a-80be-19b0df80cf46","key-id":"iJU_vyejSQtLnAQVmtHHq9RX72Jb40JMWVv9GgpJ6311Gr12A8_tSCoURR6sJoZ0","session-macaroon":"MDAxZWxvY2F0aW9uIGFwaS5zbmFwY3JhZnQuaW8KMDAxZWlkZW50aWZpZXIgZGV2aWNlLXNlc3Npb24KMDA0MGNpZCBhcGkuc25hcGNyYWZ0LmlvfHZhbGlkX3NpbmNlfDIwMjUtMDEtMDdUMjI6NTg6MDYuNjc1NTcxCjAwNDZjaWQgYXBpLnNuYXBjcmFmdC5pb3xzZXNzaW9ufGM4Y2ZiOWM5LTk0YTItNGNiNi1hMmQ0LTY2ODRkZTcxNDNjMAowMDliY2lkIGFwaS5zbmFwY3JhZnQuaW98ZGV2aWNlfHsiYXV0aG9yaXR5IjogImNhbm9uaWNhbCIsICJicmFuZCI6ICJjYW5vbmljYWwiLCAibW9kZWwiOiAiYXdzLWNsYXNzaWMiLCAic2VyaWFsIjogImQ1NGJhMDRhLTY5NWMtNGM4YS04MGJlLTE5YjBkZjgwY2Y0NiJ9CjAwMjBjaWQgYXBpLnNuYXBjcmFmdC5pb3xzdG9yZXwKMDAyZnNpZ25hdHVyZSAKuX_9tNRveTafsKHiEt5xnlucM3bfu-jApmUcyHEEQwo"}},"config":{"core":{"cloud":{"availability-zone":"us-east-2b","name":"aws","region":"us-east-2"},"refresh":{},"seed":{"loaded":true}}},"conns":{"lxd:lxd-support core:lxd-support":{"auto":true,"interface":"lxd-support"},"lxd:network core:network":{"auto":true,"interface":"network"},"lxd:network-bind core:network-bind":{"auto":true,"interface":"network-bind"},"lxd:system-observe core:system-observe":{"auto":true,"interface":"system-observe"}},"last-refresh":"2025-01-08T23:18:06.789003986-06:00","last-refresh-hints":"2021-04-23T00:34:45.749036127Z","patch-level":6,"patch-sublevel":3,"patch-sublevel-last-version":"2.66.1","preseed-start-time":"2021-02-23T23:49:58.007053445Z","preseed-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"preseed-time":"2021-02-23T23:50:04.446239096Z","preseeded":true,"refresh-candidates":{},"refresh-privacy-key":"g704FHcv0Pckm3nj","seed-restart-system-key":{"version":10,"build-id":"f6f929161ff75b7a83d57ee39a7c90d07b5010fa","apparmor-features":["caps","dbus","domain","file","mount","namespaces","network","network_v8","policy","ptrace","query","rlimit","signal"],"apparmor-parser-mtime":1589907589,"apparmor-parser-features":["unsafe"],"nfs-home":false,"overlay-root":"","seccomp-features":["allow","errno","kill_process","kill_thread","log","trace","trap","user_notif"],"seccomp-compiler-version":"2ccd1210af99a0998eaddbf01a74535f222c148f 2.4.3 9b218ef9a4e508dd8a7f848095cb8875d10a4bf28428ad81fdc3f8dac89108f7 bpf-actlog","cgroup-version":"1"},"seed-restart-time":"2021-04-23T00:34:45.451530228Z","seed-time":"2021-04-23T00:34:48.134686428Z","seeded":true,"seeded-systems":[{"system":"","model":"aws-classic","brand-id":"canonical","revision":0,"timestamp":"2018-03-28T00:00:00Z","seed-time":"2021-04-23T00:34:48.134686428Z"}],"snap-cookies":{"5e51KAapWFH2S6Pq1_k5pj38kDCJfBGZwj4Lccy9-4ZzKV4QK38Q":"core22","9Ik8_T1g-vkB36qtEVtFHQ26GEq_1MVDiz64viTuob-kh7QJ-bXp":"core18","EgCCiF-EA1LESrzE6f7eWTsNNarEnFo4zqZZpgEm0KEs24FOYGDp":"snapd","MCsSyQl6v8ejlpGpqXRE4xUuBmjFcy7BylqrohPSDnR2hEgomXrT":"core20","plf6ZN7S7plAWwR473QRPz37i90mVRnKUR7Q6hYe4Ja1rFrT7wqj":"lxd","qJXNu_kWACy61RpAISymmAAH01SCjAM7rFrMKIMjCjTTeTWvkFng":"amazon-ssm-agent"},"snapd-snap-cve-2021-44731-vuln-removed":true,"snapd-snap-cve-2022-3328-vuln-removed":true,"snaps":{"amazon-ssm-agent":{"type":"app","sequence":[{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"9565","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."},{"name":"amazon-ssm-agent","snap-id":"T09mpujiTnzSdSCuqNkE7YXXTWDq13tC","revision":"9881","channel":"latest/stable","links":{"contact":["https://aws.amazon.com/contact-us/"],"website":["https://docs.aws.amazon.com/systems-manager/"]},"contact":"https://aws.amazon.com/contact-us/","title":"amazon-ssm-agent","summary":"Agent to enable remote management of your Amazon EC2 instance configuration","description":"The SSM Agent runs on EC2 instances and enables you to quickly and easily\nexecute remote commands or scripts against one or more instances. The agent\nuses SSM documents. When you execute a command, the agent on the instance\nprocesses the document and configures the instance as specified. Currently,\nthe SSM Agent and Run Command enable you to quickly run Shell scripts on an\ninstance using the AWS-RunShellScript SSM document."}],"active":true,"current":"9881","channel":"latest/stable/ubuntu-20.04","classic":true,"aliases":{"ssm-cli":{"auto":"ssm-cli"}},"last-refresh-time":"2024-10-23T15:58:07.439612793-06:00"},"core18":{"type":"base","sequence":[{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2829","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core18","snap-id":"CSO04Jhav2yK0uz97cr0ipQRyqg0qQL6","revision":"2846","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/core18/issues"],"source":["https://github.com/snapcore/core18"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/core18/issues","title":"Core 18 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core18 base snap provides a runtime environment based on Ubuntu 18.04 LTS (Bionic Beaver).\n\nOther Ubuntu environment base snaps include:\n- Core 20: \u003chttps://snapcraft.io/core20\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core18**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core18\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2846","channel":"latest/stable","last-refresh-time":"2024-10-02T06:55:14.851201292-06:00"},"core20":{"type":"base","sequence":[{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2379","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core20","snap-id":"DLqre5XGLbDqg9jPtiAhRRjDuPVa5X1q","revision":"2434","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core20"],"website":["https://snapcraft.io"]},"title":"Core 20 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core20 base snap provides a runtime environment based on Ubuntu 20.04 LTS (Focal Fossa).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 22: \u003chttps://snapcraft.io/core22\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core20**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core20\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"2434","channel":"latest/stable","last-refresh-time":"2024-10-21T17:48:01.143785096-06:00"},"core22":{"type":"base","sequence":[{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"1663","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"},{"name":"core22","snap-id":"amcUKQILKXHHTlmSa7NMdnXSx02dNeeT","revision":"1722","channel":"latest/stable","links":{"issues":["https://github.com/snapcore/core20/issues"],"source":["https://github.com/snapcore/core22"],"website":["https://snapcraft.io/"]},"title":"Core 22 base snap","summary":"Snap runtime environment","description":"Base snaps are a specific type of snap that include libraries and dependencies common to many applications. They provide a consistent and reliable execution environment for the snap packages that use them.\n\nThe core22 base snap provides a runtime environment based on Ubuntu 22.04 LTS (Jammy Jellyfish).\n\nOther Ubuntu environment base snaps include:\n- Core 18: \u003chttps://snapcraft.io/core18\u003e\n- Core 20: \u003chttps://snapcraft.io/core20\u003e \n- Core 24: \u003chttps://snapcraft.io/core24\u003e\n\n**Using a base snap**\n\nBase snaps are installed automatically when a snap package requires them. Only one of each type of base snap is ever installed.\n\nManually removing a base snap may affect the stability of your system.\n\n**Building snaps with core22**\n\nSnap developers can use this base in their own snaps by adding the following to the snap's snapcraft.yaml:\n\n base: core22\n\n**Additional Information***\n\nFor more details, and guidance on using base snaps, see our documentation: \u003chttps://snapcraft.io/docs/base-snaps\u003e"}],"active":true,"current":"1722","channel":"latest/stable","last-refresh-time":"2024-12-02T22:43:09.702218781-06:00"},"lxd":{"type":"app","sequence":[{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"24061","channel":"4.0/stable","contact":"https://github.com/lxc/lxd/issues","title":"lxd","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - shiftfs.enable: Enable shiftfs support [default=auto]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"},{"name":"lxd","snap-id":"J60k4JY0HppjwOjW8dZdYc8obXKxujRu","revision":"29619","channel":"4.0/stable","links":{"contact":["https://github.com/canonical/lxd/issues"],"website":["https://ubuntu.com/lxd"]},"contact":"https://github.com/canonical/lxd/issues","title":"LXD","summary":"LXD - container and VM manager","description":"LXD is a system container and virtual machine manager.\n\nIt offers a simple CLI and REST API to manage local or remote instances,\nuses an image based workflow and support for a variety of advanced features.\n\nImages are available for all Ubuntu releases and architectures as well\nas for a wide number of other Linux distributions. Existing\nintegrations with many deployment and operation tools, makes it work\njust like a public cloud, except everything is under your control.\n\nLXD containers are lightweight, secure by default and a great\nalternative to virtual machines when running Linux on Linux.\n\nLXD virtual machines are modern and secure, using UEFI and secure-boot\nby default and a great choice when a different kernel or operating\nsystem is needed.\n\nWith clustering, up to 50 LXD servers can be easily joined and managed\ntogether with the same tools and APIs and without needing any external\ndependencies.\n\n\nSupported configuration options for the snap (snap set lxd [\u003ckey\u003e=\u003cvalue\u003e...]):\n\n - ceph.builtin: Use snap-specific Ceph configuration [default=false]\n - ceph.external: Use the system's ceph tools (ignores ceph.builtin) [default=false]\n - criu.enable: Enable experimental live-migration support [default=false]\n - daemon.debug: Increase logging to debug level [default=false]\n - daemon.group: Set group of users that have full control over LXD [default=lxd]\n - daemon.user.group: Set group of users that have restricted LXD access [default=lxd]\n - daemon.preseed: Pass a YAML configuration to `lxd init` on initial start\n - daemon.syslog: Send LXD log events to syslog [default=false]\n - daemon.verbose: Increase logging to verbose level [default=false]\n - lvm.external: Use the system's LVM tools [default=false]\n - lxcfs.pidfd: Start per-container process tracking [default=false]\n - lxcfs.loadavg: Start tracking per-container load average [default=false]\n - lxcfs.cfs: Consider CPU shares for CPU usage [default=false]\n - lxcfs.debug: Increase logging to debug level [default=false]\n - openvswitch.builtin: Run a snap-specific OVS daemon [default=false]\n - openvswitch.external: Use the system's OVS tools (ignores openvswitch.builtin) [default=false]\n - ovn.builtin: Use snap-specific OVN configuration [default=false]\n - ui.enable: Enable the web interface [default=false]\n\nFor system-wide configuration of the CLI, place your configuration in\n/var/snap/lxd/common/global-conf/ (config.yml and servercerts)"}],"active":true,"current":"29619","channel":"4.0/stable/ubuntu-20.04","aliases":{"lxc":{"auto":"lxc"}},"last-refresh-time":"2024-07-29T22:58:01.537609706-06:00"},"snapd":{"type":"snapd","sequence":[{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"21759","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."},{"name":"snapd","snap-id":"PMrrV4ml8uWuEUDBT8dSGnKUYbevVhc4","revision":"23258","channel":"latest/stable","links":{"contact":["https://github.com/snapcore/snapd/issues"],"website":["https://snapcraft.io"]},"contact":"https://github.com/snapcore/snapd/issues","title":"snapd","summary":"Daemon and tooling that enable snap packages","description":"Install, configure, refresh and remove snap packages. Snaps are\n'universal' packages that work across many different Linux systems,\nenabling secure distribution of the latest apps and utilities for\ncloud, servers, desktops and the internet of things.\n\nStart with 'snap list' to see installed snaps."}],"active":true,"current":"23258","channel":"latest/stable","required":true,"last-refresh-time":"2024-11-28T04:28:00.3777434-06:00"}},"start-of-operation-time":"2021-04-23T00:34:45.630907428Z","timings":[{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":622529421}],"start-time":"2024-12-19T12:53:06.18827657-06:00","stop-time":"2024-12-19T12:53:06.810805994-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":615900829}],"start-time":"2024-12-19T22:13:06.187367204-06:00","stop-time":"2024-12-19T22:13:06.803268033-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":713318736}],"start-time":"2024-12-20T03:18:06.187489887-06:00","stop-time":"2024-12-20T03:18:06.900808625-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":271219532},{"label":"write-catalogs","summary":"query store for catalogs","duration":728524273}],"start-time":"2024-12-20T03:48:06.187855892-06:00","stop-time":"2024-12-20T03:48:07.200545678-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":648665265}],"start-time":"2024-12-20T08:33:06.187606995-06:00","stop-time":"2024-12-20T08:33:06.836272251-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":624285413}],"start-time":"2024-12-20T12:03:06.199013646-06:00","stop-time":"2024-12-20T12:03:06.82329907-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":591598127}],"start-time":"2024-12-20T18:23:06.188345127-06:00","stop-time":"2024-12-20T18:23:06.779943253-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":595774768}],"start-time":"2024-12-21T00:53:06.187355326-06:00","stop-time":"2024-12-21T00:53:06.783130088-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":286998301},{"label":"write-catalogs","summary":"query store for catalogs","duration":713841236}],"start-time":"2024-12-21T03:48:06.18785719-06:00","stop-time":"2024-12-21T03:48:07.202442177-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":628551250}],"start-time":"2024-12-21T07:08:06.187340741-06:00","stop-time":"2024-12-21T07:08:06.815891979-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":631266792}],"start-time":"2024-12-21T15:53:06.197473483-06:00","stop-time":"2024-12-21T15:53:06.828740282-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":562440080}],"start-time":"2024-12-21T19:13:06.187369819-06:00","stop-time":"2024-12-21T19:13:06.749809842-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":588409715}],"start-time":"2024-12-22T01:38:06.187582209-06:00","stop-time":"2024-12-22T01:38:06.775991914-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":273667381},{"label":"write-catalogs","summary":"query store for catalogs","duration":762825070}],"start-time":"2024-12-22T03:48:06.188162433-06:00","stop-time":"2024-12-22T03:48:07.237854564-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":593212609}],"start-time":"2024-12-22T11:13:06.237684746-06:00","stop-time":"2024-12-22T11:13:06.830897352-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":616004255}],"start-time":"2024-12-22T13:18:06.18718536-06:00","stop-time":"2024-12-22T13:18:06.803189603-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":602769910}],"start-time":"2024-12-22T23:18:06.187441414-06:00","stop-time":"2024-12-22T23:18:06.79021131-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":655488608}],"start-time":"2024-12-23T00:58:06.187863537-06:00","stop-time":"2024-12-23T00:58:06.84335215-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1019869722}],"start-time":"2024-12-23T10:13:06.18751801-06:00","stop-time":"2024-12-23T10:13:07.207387743-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":614210796}],"start-time":"2024-12-23T12:43:06.187153096-06:00","stop-time":"2024-12-23T12:43:06.801363892-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":601126277}],"start-time":"2024-12-23T22:38:06.187331608-06:00","stop-time":"2024-12-23T22:38:06.788457871-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":613025896}],"start-time":"2024-12-24T04:13:06.188761412-06:00","stop-time":"2024-12-24T04:13:06.801787309-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":608601268}],"start-time":"2024-12-24T06:13:06.187913384-06:00","stop-time":"2024-12-24T06:13:06.796514653-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":571292396}],"start-time":"2024-12-24T16:58:06.187634408-06:00","stop-time":"2024-12-24T16:58:06.758926743-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":587525901}],"start-time":"2024-12-24T18:53:06.187346138-06:00","stop-time":"2024-12-24T18:53:06.774872027-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":631492983}],"start-time":"2024-12-25T01:48:06.1877321-06:00","stop-time":"2024-12-25T01:48:06.819225077-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":267817785},{"label":"write-catalogs","summary":"query store for catalogs","duration":794829487}],"start-time":"2024-12-25T04:03:06.188616139-06:00","stop-time":"2024-12-25T04:03:07.26626282-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":644951549}],"start-time":"2024-12-25T07:18:06.18740303-06:00","stop-time":"2024-12-25T07:18:06.832354587-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":565518467}],"start-time":"2024-12-25T17:58:06.187151903-06:00","stop-time":"2024-12-25T17:58:06.752670359-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":598857318}],"start-time":"2024-12-25T18:18:06.187152985-06:00","stop-time":"2024-12-25T18:18:06.786010298-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":1127422581}],"start-time":"2024-12-26T03:13:06.187800276-06:00","stop-time":"2024-12-26T03:13:07.315222863-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":281517697},{"label":"write-catalogs","summary":"query store for catalogs","duration":736125363}],"start-time":"2024-12-26T04:08:06.187315386-06:00","stop-time":"2024-12-26T04:08:07.217824383-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":598562941}],"start-time":"2024-12-26T08:38:06.187642314-06:00","stop-time":"2024-12-26T08:38:06.786205247-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":556754755}],"start-time":"2024-12-26T14:28:06.18731021-06:00","stop-time":"2024-12-26T14:28:06.744064923-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":588178904}],"start-time":"2024-12-26T18:18:06.187187423-06:00","stop-time":"2024-12-26T18:18:06.775366318-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":270861377},{"label":"write-catalogs","summary":"query store for catalogs","duration":712429628}],"start-time":"2024-12-27T04:08:06.18733046-06:00","stop-time":"2024-12-27T04:08:07.184652769-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":626702819}],"start-time":"2024-12-27T04:13:06.188175499-06:00","stop-time":"2024-12-27T04:13:06.814878313-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":611610470}],"start-time":"2024-12-27T06:13:06.248487168-06:00","stop-time":"2024-12-27T06:13:06.860097639-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":578329910}],"start-time":"2024-12-27T17:43:06.18759136-06:00","stop-time":"2024-12-27T17:43:06.765921285-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":591912939}],"start-time":"2024-12-27T19:23:06.188477585-06:00","stop-time":"2024-12-27T19:23:06.780390519-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":264958659},{"label":"write-catalogs","summary":"query store for catalogs","duration":731997905}],"start-time":"2024-12-28T04:08:06.187370246-06:00","stop-time":"2024-12-28T04:08:07.196870062-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":636427426}],"start-time":"2024-12-28T04:43:06.187755842-06:00","stop-time":"2024-12-28T04:43:06.824183254-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":929661033}],"start-time":"2024-12-28T11:43:06.188578644-06:00","stop-time":"2024-12-28T11:43:07.118239675-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":595185682}],"start-time":"2024-12-28T15:03:06.187981982-06:00","stop-time":"2024-12-28T15:03:06.783167663-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":616996430}],"start-time":"2024-12-28T18:13:06.18919268-06:00","stop-time":"2024-12-28T18:13:06.806189151-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":581725557}],"start-time":"2024-12-29T03:53:06.198602872-06:00","stop-time":"2024-12-29T03:53:06.780328432-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":283525275},{"label":"write-catalogs","summary":"query store for catalogs","duration":814428535}],"start-time":"2024-12-29T04:13:06.187366825-06:00","stop-time":"2024-12-29T04:13:07.296132619-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":601738369}],"start-time":"2024-12-29T09:33:06.18755892-06:00","stop-time":"2024-12-29T09:33:06.789297286-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":567164064}],"start-time":"2024-12-29T17:43:06.187404625-06:00","stop-time":"2024-12-29T17:43:06.754568683-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":599446433}],"start-time":"2024-12-29T21:38:06.187272462-06:00","stop-time":"2024-12-29T21:38:06.786718901-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":273242070},{"label":"write-catalogs","summary":"query store for catalogs","duration":743651576}],"start-time":"2024-12-30T04:13:06.187453036-06:00","stop-time":"2024-12-30T04:13:07.215908725-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":591747394}],"start-time":"2024-12-30T05:18:06.187365532-06:00","stop-time":"2024-12-30T05:18:06.779112926-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":611114086}],"start-time":"2024-12-30T10:48:06.187186113-06:00","stop-time":"2024-12-30T10:48:06.79830019-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":559320217}],"start-time":"2024-12-30T17:38:06.263112707-06:00","stop-time":"2024-12-30T17:38:06.82243292-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":562542700}],"start-time":"2024-12-30T19:38:06.18737687-06:00","stop-time":"2024-12-30T19:38:06.749919581-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":580503327}],"start-time":"2024-12-31T04:43:06.187178969-06:00","stop-time":"2024-12-31T04:43:06.767682285-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":631141624}],"start-time":"2024-12-31T06:23:06.198233894-06:00","stop-time":"2024-12-31T06:23:06.829375508-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":597520709}],"start-time":"2024-12-31T14:18:06.187159155-06:00","stop-time":"2024-12-31T14:18:06.784679875-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":576524491}],"start-time":"2024-12-31T18:48:06.187419466-06:00","stop-time":"2024-12-31T18:48:06.763943959-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":600006570}],"start-time":"2025-01-01T02:43:06.188001831-06:00","stop-time":"2025-01-01T02:43:06.788008396-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":274876417},{"label":"write-catalogs","summary":"query store for catalogs","duration":736437836}],"start-time":"2025-01-01T04:18:06.187258767-06:00","stop-time":"2025-01-01T04:18:07.208780164-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":560781950}],"start-time":"2025-01-01T11:18:06.187261326-06:00","stop-time":"2025-01-01T11:18:06.748043276-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":582720102}],"start-time":"2025-01-01T13:53:06.187569577-06:00","stop-time":"2025-01-01T13:53:06.770289691-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":607651327}],"start-time":"2025-01-01T21:58:06.187141152-06:00","stop-time":"2025-01-01T21:58:06.794792471-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":289164414},{"label":"write-catalogs","summary":"query store for catalogs","duration":710277863}],"start-time":"2025-01-02T04:18:06.187302506-06:00","stop-time":"2025-01-02T04:18:07.19722031-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":580416820}],"start-time":"2025-01-02T05:58:06.187335125-06:00","stop-time":"2025-01-02T05:58:06.767751945-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":619457283}],"start-time":"2025-01-02T09:13:06.188375607-06:00","stop-time":"2025-01-02T09:13:06.807832899-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":978906937}],"start-time":"2025-01-02T12:18:06.18713142-06:00","stop-time":"2025-01-02T12:18:07.166038365-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":604330853}],"start-time":"2025-01-02T21:13:06.187306825-06:00","stop-time":"2025-01-02T21:13:06.791637677-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":630187554}],"start-time":"2025-01-03T00:43:06.187589445-06:00","stop-time":"2025-01-03T00:43:06.817776998-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":264559467},{"label":"write-catalogs","summary":"query store for catalogs","duration":665912763}],"start-time":"2025-01-03T04:18:06.187371535-06:00","stop-time":"2025-01-03T04:18:07.125174365-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":626988268}],"start-time":"2025-01-03T08:58:06.207650975-06:00","stop-time":"2025-01-03T08:58:06.834639243-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":268238152}],"start-time":"2025-01-03T13:03:06.197738145-06:00","stop-time":"2025-01-03T13:03:06.465976291-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":591006006}],"start-time":"2025-01-03T18:53:06.187215825-06:00","stop-time":"2025-01-03T18:53:06.778221821-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":586891860}],"start-time":"2025-01-04T01:08:06.187282177-06:00","stop-time":"2025-01-04T01:08:06.77417404-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":279010411},{"label":"write-catalogs","summary":"query store for catalogs","duration":774473556}],"start-time":"2025-01-04T04:18:06.187613183-06:00","stop-time":"2025-01-04T04:18:07.249720836-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":634577173}],"start-time":"2025-01-04T06:18:06.207337981-06:00","stop-time":"2025-01-04T06:18:06.841915161-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":593097457}],"start-time":"2025-01-04T12:48:06.18740921-06:00","stop-time":"2025-01-04T12:48:06.780506667-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":606319537}],"start-time":"2025-01-04T19:23:06.187739031-06:00","stop-time":"2025-01-04T19:23:06.794058558-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":602482725}],"start-time":"2025-01-05T01:18:06.187346212-06:00","stop-time":"2025-01-05T01:18:06.789828938-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":278703889},{"label":"write-catalogs","summary":"query store for catalogs","duration":727545638}],"start-time":"2025-01-05T04:18:06.188618015-06:00","stop-time":"2025-01-05T04:18:07.207114175-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":594834998}],"start-time":"2025-01-05T06:18:06.19750261-06:00","stop-time":"2025-01-05T06:18:06.792337609-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":612711500}],"start-time":"2025-01-05T16:08:06.187183874-06:00","stop-time":"2025-01-05T16:08:06.799895443-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":608948219}],"start-time":"2025-01-05T18:58:06.187634075-06:00","stop-time":"2025-01-05T18:58:06.79658228-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":270792526},{"label":"write-catalogs","summary":"query store for catalogs","duration":705183299}],"start-time":"2025-01-06T04:23:06.188080674-06:00","stop-time":"2025-01-06T04:23:07.172651752-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":584523786}],"start-time":"2025-01-06T05:18:06.187162368-06:00","stop-time":"2025-01-06T05:18:06.771686145-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":638094628}],"start-time":"2025-01-06T08:13:06.188296185-06:00","stop-time":"2025-01-06T08:13:06.826390806-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":640891358}],"start-time":"2025-01-06T15:58:06.18722056-06:00","stop-time":"2025-01-06T15:58:06.828111933-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":655614663}],"start-time":"2025-01-06T19:18:06.187114166-06:00","stop-time":"2025-01-06T19:18:06.842728821-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":624165325}],"start-time":"2025-01-07T00:53:06.21677799-06:00","stop-time":"2025-01-07T00:53:06.840943318-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":285714878},{"label":"write-catalogs","summary":"query store for catalogs","duration":780753960}],"start-time":"2025-01-07T04:28:06.187744326-06:00","stop-time":"2025-01-07T04:28:07.266723289-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":659384574}],"start-time":"2025-01-07T08:48:06.187234158-06:00","stop-time":"2025-01-07T08:48:06.846618716-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":943599028}],"start-time":"2025-01-07T16:58:06.192933123-06:00","stop-time":"2025-01-07T16:58:07.13653214-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":616312330}],"start-time":"2025-01-07T19:08:06.187521762-06:00","stop-time":"2025-01-07T19:08:06.803834098-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":634055759}],"start-time":"2025-01-08T02:23:06.192278636-06:00","stop-time":"2025-01-08T02:23:06.826334398-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":287562967},{"label":"write-catalogs","summary":"query store for catalogs","duration":714724430}],"start-time":"2025-01-08T04:33:06.187755695-06:00","stop-time":"2025-01-08T04:33:07.200218275-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":731398108}],"start-time":"2025-01-08T07:03:06.187188289-06:00","stop-time":"2025-01-08T07:03:06.918586398-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":644640913}],"start-time":"2025-01-08T15:33:06.187123933-06:00","stop-time":"2025-01-08T15:33:06.831764853-06:00"},{"tags":{"ensure":"auto-refresh"},"timings":[{"label":"auto-refresh","summary":"query store and setup auto-refresh change","duration":602710286}],"start-time":"2025-01-08T23:18:06.187140358-06:00","stop-time":"2025-01-08T23:18:06.789850643-06:00"},{"tags":{"ensure":"refresh-catalogs"},"timings":[{"label":"get-sections","summary":"query store for sections","duration":289220864},{"label":"write-catalogs","summary":"query store for catalogs","duration":771670716}],"start-time":"2025-01-09T04:33:06.222742121-06:00","stop-time":"2025-01-09T04:33:07.294528493-06:00"}]},"changes":{},"tasks":{},"last-change-id":133,"last-task-id":2918,"last-lane-id":136,"last-notice-id":19,"last-notice-timestamp":"2024-12-02T22:43:10.723887126-06:00"}